Skip to main content
 

ibm mi

Results 351 - 375 of 806Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility, security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security, it security
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
Businesses are transforming themselves to participate in the API economy. But how do you rapidly and securely expose your business to this developer ecosystem? Attend this webcast to find out how you can define and publish your APIs easily using the IBM API Management Service — the new SaaS solution from IBM. This cloud hosted service provides a complete set of capabilities to create, secure, manage, and socialize APIs to internal and external developer communities in the cloud, without incurring any IT infrastructure setup. Learn more from IBM's product team on how it will help enable companies to embrace the API economy and accelerate business transformation. Webcast attendees will learn about the following: •IBM API Management Service capabilities, features and benefits •Understanding different use cases of IBM API Management Service •Pricing models •How to get started using the API Management Service
Tags : 
ibm, business transformation, api management, develop, saas, it infrastructure, application, programming, interface, software, apps, app
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
Future proof your investment with IBM WebSphere - Your gateway to cloud, mobile and Internet of Things.
Tags : 
ibm, websphere, cloud, mobile, analytics, iot, tibco, migrate, solutions
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
Using data to reinvent one’s business has reached the mainstream. Data and analytics allow us to change the world around us: it gives us insights into what is happening, allowing us to optimize our strategy, create new business opportunities, and make more accurate predictions.
Tags : 
ibm, data management, analytics, insights, optimization strategy, predictions
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud, monitoring, tco
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
IBM’s Mobile Smarter Process offering combines our award winning Mobile, Process and Cloud solutions to allow you to capitalize on mobile’s unique capabilities by redefining your organization around the mobile moment. Join our experts as they present an overview of Mobile Smarter Process and corresponding demo on Cloud to learn how your organization can get the most out of your mobile initiative through faster time to value. And then you too can make the mobile promise come true.
Tags : 
ibm, mobile, cloud, mobile smarter process, time to value
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : 
ibm, odm, operational, decision, maker, analytics, update, v8.7, decisions, data, scope, scale, speed, context
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
Daptiv upgraded to IBM® Cognos® Business Intelligence 10.2. By combining Cognos Lifecycle Manager with custom-built tools, Daptiv successfully migrated over 30,000 reports to the new version with no disruption for its 500-plus clients.
Tags : 
ibm, daptiv, project portfolio management, analytics, cloud computing, saas
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
With a data explosion upon us that shows no slowing in sight, information governance is no longer an option for corporations. IBM StoredIQ is an important first step toward getting data under control, lowering storage costs and mitigating risk.
Tags : 
information governance, ibm storediq, risk, storage, data management
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
How effective is your mobile app development process when it comes to meeting customer needs and business objectives? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.” IBM customer, Bank of Montreal, also shares their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction. And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : 
mobile app development, customer-facing applications, enterprise applications, ibm, mobile moments, traffic, sales, productivity, brand satisfaction
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, cybercrime prevention, it security solutions, trusteer
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : 
ibm, data discovery, data classification, big data, risk mitigation
    
IBM
Published By: IBM     Published Date: Feb 19, 2015
Today, a mix of influences - including innovation in biology and technology, market demand and consumerism - is furthering a genomic medicine evolution that crosses industries.
Tags : 
genomic medicine, market demand, consumerism, ibm, genomic medicine evolution, information technology, healthcare reform
    
IBM
Published By: IBM     Published Date: Feb 18, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : 
mobile app testing, ibm, desktop applications, mobile test environments, mobile device cloud
    
IBM
Published By: IBM     Published Date: Feb 13, 2015
With its Application Ready solutions, IBM is outflanking competitors in Technical Computing and fast-tracking the delivery of client business value by providing an expertly designed, tightly integrated and performance optimized architecture for several key industrial applications.
Tags : 
ibm, technical computing, application development, application architecture, architecture, business workflow
    
IBM
Published By: IBM     Published Date: Feb 13, 2015
This video explains how IBM Platform Computing is transforming isolated clusters and grids into flexible, dynamic high performance private, hybrid and public clouds.
Tags : 
ibm, hpc, cloud computing, private cloud, hybrid cloud
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
Tags : 
ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.
Tags : 
ibm, ibm x-force, ip reputation tracking, iot, security landscape
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, data breaches, it attacks, cyber-crime, forensics solution
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.
Tags : 
security solutions, layered protection, protect data, advanced analytics, ibm
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
criminal fraud detection, authentication methods, ibm, criminal detection software
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Today, business growth is centered on human creativity and innovation. Business leaders can take advantage of PaaS solutions such as IBM Bluemix to help address the challenges posed by the innovation economy, implement new business models and help increase customer satisfaction.
Tags : 
apis, mobile apps, iot, paas solutions, ibm bluemix
    
IBM
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.